General
-
Target
ec833a0cfa3ff26f81c362ce6d32918ae823f3ab269705bd6a31b8d1f78fa756.exe
-
Size
65KB
-
Sample
250201-lxj9jsypdl
-
MD5
d131131f5e0a68ef9b854110aa1a2876
-
SHA1
9a6b53b132628eb07da80269498719433ca29579
-
SHA256
ec833a0cfa3ff26f81c362ce6d32918ae823f3ab269705bd6a31b8d1f78fa756
-
SHA512
60882f66de7ac5a19fda991f82b11a01b3fc1c8aabdbc0cfb13cb97ca6d5de17eb902102da0cf0fca818f0bacfb8d842ef9ada0a48171b7c76da7fd3a00eb1e9
-
SSDEEP
768:d89xaQvnhz7zL4v25rzPvSNqvUrC/bYCyuljcGuIw4lzH76g2u0h2HzOInhCaNTG:2kQvhz0vWzHhBOgD0hyxmQuY6ZdDOdeP
Static task
static1
Behavioral task
behavioral1
Sample
ec833a0cfa3ff26f81c362ce6d32918ae823f3ab269705bd6a31b8d1f78fa756.exe
Resource
win7-20240708-en
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Targets
-
-
Target
ec833a0cfa3ff26f81c362ce6d32918ae823f3ab269705bd6a31b8d1f78fa756.exe
-
Size
65KB
-
MD5
d131131f5e0a68ef9b854110aa1a2876
-
SHA1
9a6b53b132628eb07da80269498719433ca29579
-
SHA256
ec833a0cfa3ff26f81c362ce6d32918ae823f3ab269705bd6a31b8d1f78fa756
-
SHA512
60882f66de7ac5a19fda991f82b11a01b3fc1c8aabdbc0cfb13cb97ca6d5de17eb902102da0cf0fca818f0bacfb8d842ef9ada0a48171b7c76da7fd3a00eb1e9
-
SSDEEP
768:d89xaQvnhz7zL4v25rzPvSNqvUrC/bYCyuljcGuIw4lzH76g2u0h2HzOInhCaNTG:2kQvhz0vWzHhBOgD0hyxmQuY6ZdDOdeP
-
Modifies firewall policy service
-
Sality family
-
UAC bypass
-
Windows security bypass
-
Windows security modification
-
Checks whether UAC is enabled
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5